A ______is a harmful computer program that has been hidden inside of something
benign, such as an email attachment or even an innocent looking program:
a) Trojan Horses
b) Worms
c) Macro Viruses
d) None of These

1 Answer

Answer :

a) Trojan Horses

Related questions

Description : More subtle because you are not aware that you are running these macros (the document opens and the application automatically runs); spread via email A. The purpose of copyright B. Danger of macro viruses C. Derivative works D. computer-specific crime

Last Answer : B. Danger of macro viruses

Description : More subtle because you are not aware that you are running these macros (the document opens and the application automatically runs); spread via email A. The purpose of copyright B. Danger of macro viruses C. Derivative works D. computer-specific crime

Last Answer : B. Danger of macro viruses 

Description : What is software you don't want hidden inside software you do want? a. Adware b. Trojan‐horse software c. Spyware d. All of the above

Last Answer : d. All of the above

Description : _______viruses infect executable program files: a) File Infector Viruses b) Macro Viruses c) Multi Partite Viruses d) None of These

Last Answer : a) File Infector Viruses

Description : The ______is a sequence of instructions that tells the computer how to process the data: a) program b) data c) controls d) None of The Above

Last Answer : a) program

Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Pick the odd one out : (1) Java clients (2) Worms (3) Trojan Horse (4) Virus

Last Answer : Trojan Horse 

Description : More subtle because you are not aware that you are running these macros (A) The purpose of copyright (B) Danger of macro viruses (C) Derivative works (D) computer-specific crime

Last Answer : (B) Danger of macro viruses

Description : Computer crime or Cyber crime is crime that involves: a) Computer b) Network c) Both of Above d) None of These ✐ 386. Net crim

Last Answer : c) Both of Above

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : c. Script virus

Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : a. Macro

Description : …………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. a) Zombie b) Worm c) Trojan Horses d) Logic Bomb

Last Answer : c) Trojan Horses

Description : …………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. A) Zombie B) Worm C) Trojan Horses D) Logic Bomb

Last Answer : C) Trojan Horses

Description : Which of the following is/are threats for electronic payment systems? a) Computer worms b) Computer Virus c) Trojan horse d) All of the above

Last Answer : d) All of the above

Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above

Last Answer : iv) All of the above

Description : _____ infections have cost more money and taken more time to repair than any other virus type: a) File Infector Viruses b) Multi Partite Viruses c) Macro Viruses d) None of These

Last Answer : c) Macro Viruses

Description : Which among the following is correct about the Antivirus Programs: a) They contain a database of signatures for all known viruses and worms b) The software searches a computer for the presence of these signatures c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Most Keyboards use an arrangement of keys given the name: a) Dvork b) ✐ WERTY c) CISC d) None of The Above

Last Answer : WERTY

Description : The background of any Word document - 1) is always white colour 2) is the colour you preset under the Options menu 3) is always the same for the entire document 4) can have any colour you choose

Last Answer : 2) is the colour you preset under the Options menu

Description : The memory location address are limited to--- 1) 00000 to 9ffff(16) 2) 00001 to 9ffff(16) 3) 00010 to 9ffff(16) 4) 10000 to 9ffff(16) Ans: 1) ✐ Which of the follo

Last Answer : 1) 00000 to 9ffff(16)

Description : ______is used for scanning the pictures and putting them in digitized form in the computer: a) CD-ROM b) Plotter c) Scanner d) None of The Above

Last Answer : c) Scanner

Description : What is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them? -Technology

Last Answer : Antivirus is used to identify, prevent and take action against malicious programs such as viruses and worms, by deactivating or deleting them.

Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None

Last Answer : d. None

Description : my husband passed away on 6 11 08 and the AMO Union says I cannot get his pension for 20 years at the age he would of been 65 years old can you tell me why this is?

Last Answer : Your husband's pension is a benefit that was provided by the AMO Union. This benefit stipulated that his pension would be available to him at the age of retirement, which would in this case be 65 ... bearer of his estate you get all accumulation from that when it would normally be provided to him.

Description : ______is the raw material from which useful information is derived: a) Content b) Data c) Word d) None of These

Last Answer : b) Data

Description : ______is the process of dividing the disk into tracks and sectors: a) Tracking b) Formatting c) Crashing d) Allotting e) None of The Above

Last Answer : d) MIDI

Description : State whether the following statement is true. i) A macro virus is platform independent. ii) Macro viruses infect documents, not executable portions of code. A) i-only B) ii-only C) Both i and ii D) Non i and ii

Last Answer : D) Non i and ii

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : Amo ang ibang kahulugan ng matalino?

Last Answer : Jas 3:13  Sino ang marunong at matalino sa inyo? ipakita niya sa pamamagitan ng mabuting kabuhayan ang kaniyang mga gawa sa kaamuan ng karunungan. Contact UsGlobe:+63 915 189 7007Smart:+63 918 438 8988Sun:+63 943 411 [email protected]

Description : Which one among the following chemicals is used for causing defoliation of forest trees? (a) Posphon D (b) Malic hydrazide (c) 2, 4-D (d) Amo 1618

Last Answer : (c) 2, 4-D

Description : Which one among the following chemicals is used for causing defoliation of forest trees? (a) Malic hydrazide (b) 2, 4-D (c) Amo-1618 (d) Phosphon D

Last Answer : (b) 2, 4-D

Description :  ________ is a program that places programs into memory and prepares them for execution. (1) Assembler (2) Compiler (3) Loader (4) Macro processor

Last Answer : Loader

Description : _____is a computer program that is loaded into a computer without the owner's knowledge: a) Hack Material b) Viruses c) Both of Above d) None of These

Last Answer : b) Viruses

Description : Errors in a software program are referred to as: a) Viruses b) Bugs c) Computer Fault d) None of These

Last Answer : b) Bugs

Description : When sending in a resume via email do I paste the cover letter in the email body or send it as an attachment?

Last Answer : I would say that if you have a nice letter head, it would be a good idea to attach it. Otherwise, I would just embed it in the e-mail. Just be careful to not be redundant.

Description : Anyone know how to send a photo in an email so that it is in the body of the text and not as an attachment?

Last Answer : answer:Go to Settings, Labs, Inserting images. “Allows you to insert images into a message body” Also, when composing a message, choose “Rich Formatting”. Some people receiving your message may still receive the message as an attachment, it depends on their email program & settings.

Description : Correction from previous: If you pull up a email on your laptop with a photo attachment, and then erase the email. Will the photo still be in your Internet cache?

Last Answer : answer:What operating system? How did you view the attachment? Generally speaking, the answer is yes, but there are exceptions.

Description : As end users engage with their email client they often apply their own 'relevance filter' to incoming messages. Which one of the following can be considered as the first filter for end users with incoming messages? Mark one answer: Subject line field From field To field Attachment

Last Answer : From field

Description : An attacker can create an _____attack by sending hundreds or thousands of email with very large attachments a) Connection Attacks b) Auto responder attacks c) Attachment Overloading Attacks d) All of the above

Last Answer : c) Attachment Overloading Attacks

Description : I received an email with an attachment from someone I don’t know. What should I do?

Last Answer : Be careful about opening attachments-the file you receive could contain a virus, spyware, or inappropriate content. Likewise, be careful about visiting unfamiliar websites, downloading free ... unwanted software in the download. And unauthorized file sharing of copyrighted material is illegal.

Description : Which among the following is correct regarding the Boot Sector Viruses: a) These viruses are resides in the boot sector of a floppy or hard disk. b) Such viruses are activated every time a computer ... uninfected floppy disk is inserted into the floppy drive d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Fill in the blanks (i) Viruses, worms and trojans are collectively named ________________. -Technology

Last Answer : (i) Malware(ii) (iii) Web browser(iv) Website(v) (vi) Worm(vii) href(viii) Spyware(ix) Quotes(x) Trojan Horse

Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network

Last Answer : d. block some hosts from accessing the network

Description : 466 rounded to the nearest tens?

Last Answer : 5 or more raise the score, four or less let it rest. 6 is above 5, therefor your answer would be 470.

Description : Is 123.466 greater than 132.465?

Last Answer : Nope... 123 is LESS than 132 !

Description : What is 466 rounded to the nearst ten?

Last Answer : what is 464 rounded to the nearst hundred